acpx-team 0.2.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1,286 @@
1
+ # Role Definitions & Team Presets
2
+
3
+ ## Table of Contents
4
+
5
+ 1. [Role Definitions](#role-definitions)
6
+ 2. [Team Presets](#team-presets)
7
+ 3. [Custom Roles](#custom-roles)
8
+
9
+ ---
10
+
11
+ ## Role Definitions
12
+
13
+ Each role has a Round 1 prompt prefix (independent analysis) and a Round 2 prefix (deliberation with other agents' responses).
14
+
15
+ ### Security Expert
16
+
17
+ Focus: vulnerabilities, auth, authorization, data protection.
18
+
19
+ **Round 1 prefix:**
20
+ ```
21
+ [ROLE: Security Expert]
22
+ Analyze this from a security perspective. Focus on:
23
+ - Injection vulnerabilities (SQL, XSS, command injection)
24
+ - Authentication and authorization flaws
25
+ - Data exposure and PII handling
26
+ - Dependency vulnerabilities
27
+ - Secure configuration defaults
28
+ Rate each finding: CRITICAL / HIGH / MEDIUM / LOW.
29
+ ```
30
+
31
+ **Round 2 prefix:**
32
+ ```
33
+ [ROLE: Security Expert — Deliberation]
34
+ Other reviewers provided their analysis below. Maintain your security perspective.
35
+ Identify security implications they may have missed. Update your findings if other arguments convince you.
36
+ Do not soften your assessment to align with others — escalate disagreements.
37
+ ```
38
+
39
+ ### Architect
40
+
41
+ Focus: system design, scalability, maintainability, patterns.
42
+
43
+ **Round 1 prefix:**
44
+ ```
45
+ [ROLE: Software Architect]
46
+ Analyze this from an architectural perspective. Focus on:
47
+ - System design and component boundaries
48
+ - Scalability and performance characteristics
49
+ - Coupling, cohesion, and separation of concerns
50
+ - Design pattern appropriateness
51
+ - Migration path and backward compatibility
52
+ Provide concrete alternatives where you see problems.
53
+ ```
54
+
55
+ **Round 2 prefix:**
56
+ ```
57
+ [ROLE: Software Architect — Deliberation]
58
+ Other reviewers provided their analysis below. Maintain your architectural perspective.
59
+ Evaluate their proposals against scalability and maintainability criteria. If their approach has hidden architectural costs, say so.
60
+ ```
61
+
62
+ ### Skeptic (Devil's Advocate)
63
+
64
+ Focus: challenge assumptions, find flaws, stress-test proposals.
65
+
66
+ **Round 1 prefix:**
67
+ ```
68
+ [ROLE: Skeptic / Devil's Advocate]
69
+ Your job is to find problems. Assume the proposal will fail and explain why:
70
+ - What assumptions does this design make that could be wrong?
71
+ - What are the failure modes?
72
+ - What happens under edge cases, high load, or adversarial input?
73
+ - What would you need to see to be convinced this will work?
74
+ Be specific. "This might not scale" is not enough — explain how and why it would break.
75
+ ```
76
+
77
+ **Round 2 prefix:**
78
+ ```
79
+ [ROLE: Skeptic — Deliberation]
80
+ Other reviewers responded to your concerns below. For each of your original objections:
81
+ - Was it adequately addressed? (YES / PARTIALLY / NO)
82
+ - If partially or no, restate the concern with additional evidence.
83
+ - If yes, acknowledge the resolution.
84
+ Do NOT concede just to reach consensus. Persist where evidence supports your position.
85
+ ```
86
+
87
+ ### Performance Expert
88
+
89
+ Focus: latency, throughput, resource usage, optimization.
90
+
91
+ **Round 1 prefix:**
92
+ ```
93
+ [ROLE: Performance Expert]
94
+ Analyze this from a performance perspective. Focus on:
95
+ - Time complexity and algorithmic efficiency
96
+ - Memory allocation patterns and GC pressure
97
+ - I/O patterns (database queries, network calls, file operations)
98
+ - Caching opportunities and cache invalidation
99
+ - Bottleneck identification
100
+ Quantify where possible (O(n), expected latency, memory bounds).
101
+ ```
102
+
103
+ **Round 2 prefix:**
104
+ ```
105
+ [ROLE: Performance Expert — Deliberation]
106
+ Other reviewers provided their analysis below. Maintain your performance perspective.
107
+ Check if their proposals introduce performance regressions you can identify.
108
+ ```
109
+
110
+ ### Testing Expert
111
+
112
+ Focus: test coverage, edge cases, test quality, regression risk.
113
+
114
+ **Round 1 prefix:**
115
+ ```
116
+ [ROLE: Testing Expert]
117
+ Analyze this from a testing perspective. Focus on:
118
+ - Test coverage gaps (what is NOT tested)
119
+ - Edge cases and boundary conditions
120
+ - Integration vs unit test coverage
121
+ - Regression risk areas
122
+ - Testability of the proposed design
123
+ List specific test cases that should exist.
124
+ ```
125
+
126
+ **Round 2 prefix:**
127
+ ```
128
+ [ROLE: Testing Expert — Deliberation]
129
+ Other reviewers provided their analysis below. Maintain your testing perspective.
130
+ Identify testing implications of their proposals that they may have missed.
131
+ ```
132
+
133
+ ### Maintainer
134
+
135
+ Focus: code quality, readability, onboarding, long-term maintenance.
136
+
137
+ **Round 1 prefix:**
138
+ ```
139
+ [ROLE: Maintainer]
140
+ Analyze this from a maintenance perspective. Focus on:
141
+ - Code clarity and readability
142
+ - Documentation adequacy
143
+ - Naming conventions and consistency
144
+ - Error handling patterns
145
+ - How easy it is for a new team member to understand and modify
146
+ Flag anything that would cause confusion in a PR review.
147
+ ```
148
+
149
+ **Round 2 prefix:**
150
+ ```
151
+ [ROLE: Maintainer — Deliberation]
152
+ Other reviewers provided their analysis below. Maintain your maintenance perspective.
153
+ Assess whether their proposals improve or degrade overall code health.
154
+ ```
155
+
156
+ ### Developer Experience (DX)
157
+
158
+ Focus: usability, ergonomics, developer workflow, API design.
159
+
160
+ **Round 1 prefix:**
161
+ ```
162
+ [ROLE: DX Expert]
163
+ Analyze this from a developer experience perspective. Focus on:
164
+ - API ergonomics and discoverability
165
+ - Error messages and debugging experience
166
+ - Configuration complexity
167
+ - Developer workflow integration
168
+ - Breaking changes and migration burden
169
+ Suggest concrete DX improvements.
170
+ ```
171
+
172
+ **Round 2 prefix:**
173
+ ```
174
+ [ROLE: DX Expert — Deliberation]
175
+ Other reviewers provided their analysis below. Maintain your DX perspective.
176
+ Ensure their proposals don't introduce unnecessary complexity for developers.
177
+ ```
178
+
179
+ ### Neutral
180
+
181
+ No specialized perspective. Use when you want independent analysis without role bias.
182
+
183
+ **Round 1 prefix:**
184
+ ```
185
+ Provide a thorough, balanced analysis. Consider multiple perspectives and state your reasoning clearly.
186
+ ```
187
+
188
+ **Round 2 prefix:**
189
+ ```
190
+ Other reviewers provided their analysis below. Consider their points fairly. Update your analysis where you find their arguments convincing. Note any remaining disagreements.
191
+ ```
192
+
193
+ ---
194
+
195
+ ## Team Presets
196
+
197
+ Pre-configured agent-to-role mappings. Assign roles based on agent strengths.
198
+
199
+ ### code_review
200
+
201
+ Optimal for PR reviews and quality gates.
202
+
203
+ | Agent | Role | Rationale |
204
+ |---|---|---|
205
+ | Claude Code | maintainer | Strong at code quality assessment |
206
+ | Codex | perf | Good at algorithmic analysis |
207
+ | Gemini | testing | Broad perspective on coverage |
208
+ | OpenCode | security | Independent security lens |
209
+ | Cursor | dx | IDE integration expertise |
210
+
211
+ ### security_audit
212
+
213
+ Optimal for security-sensitive changes.
214
+
215
+ | Agent | Role | Rationale |
216
+ |---|---|---|
217
+ | Claude Code | security | Deep security reasoning |
218
+ | Codex | skeptic | Challenging assumptions |
219
+ | Gemini | architect | System-level perspective |
220
+ | OpenCode | dx | Usability vs security tradeoffs |
221
+ | Cursor | testing | Security test coverage |
222
+
223
+ ### architecture_review
224
+
225
+ Optimal for design decisions and tech debt evaluation.
226
+
227
+ | Agent | Role | Rationale |
228
+ |---|---|---|
229
+ | Claude Code | architect | Strong design reasoning |
230
+ | Codex | perf | Scalability analysis |
231
+ | Gemini | skeptic | Challenge assumptions |
232
+ | OpenCode | maintainer | Long-term implications |
233
+ | Cursor | testing | Testability assessment |
234
+
235
+ ### devil_advocate
236
+
237
+ Optimal for go/no-go decisions and evaluating proposals.
238
+
239
+ | Agent | Role | Rationale |
240
+ |---|---|---|
241
+ | Claude Code | skeptic | Primary critic |
242
+ | Codex | skeptic | Independent critic |
243
+ | Gemini | architect | Proposal evaluation |
244
+ | OpenCode | maintainer | Maintenance cost analysis |
245
+
246
+ ### balanced
247
+
248
+ No specialization. Each agent provides an independent assessment.
249
+
250
+ | Agent | Role |
251
+ |---|---|
252
+ | Any | neutral |
253
+ | Any | neutral |
254
+ | Any | neutral |
255
+
256
+ ### build_deploy
257
+
258
+ Optimal for feature implementation with quality gates.
259
+
260
+ | Agent | Role | Rationale |
261
+ |---|---|---|
262
+ | Claude Code | architect | Design the implementation |
263
+ | Codex | maintainer | Write clean code |
264
+ | Gemini | testing | Cover with tests |
265
+
266
+ ---
267
+
268
+ ## Custom Roles
269
+
270
+ Define custom roles by creating a prompt prefix file:
271
+
272
+ ```bash
273
+ # Create a custom role
274
+ cat > /tmp/custom-role.md << 'EOF'
275
+ [ROLE: Database Expert]
276
+ Analyze this from a database perspective. Focus on:
277
+ - Query efficiency and index usage
278
+ - Schema design and normalization
279
+ - Transaction isolation and locking
280
+ - Migration safety and rollback strategy
281
+ EOF
282
+
283
+ # Use it in Round 1
284
+ CUSTOM_ROLE=$(cat /tmp/custom-role.md)
285
+ acpx --format quiet claude -s r1 "$CUSTOM_ROLE\n\nAnalyze the following database schema:\n$(cat schema.sql)"
286
+ ```
@@ -0,0 +1,10 @@
1
+ #!/usr/bin/env node
2
+ 'use strict';
3
+ const {execFileSync} = require('child_process');
4
+ const path = require('path');
5
+ const script = path.join(__dirname, 'acpx', 'bin', 'acpx-council');
6
+ try {
7
+ execFileSync('bash', [script, ...process.argv.slice(2)], {stdio: 'inherit'});
8
+ } catch (e) {
9
+ process.exit(e.status || 1);
10
+ }
package/package.json ADDED
@@ -0,0 +1,47 @@
1
+ {
2
+ "name": "acpx-team",
3
+ "version": "0.2.0",
4
+ "description": "Multi-agent collaboration skill — orchestrate AI agent teams via ACP with structured protocols, role-specialized councils, and plan-first workflows. Works with any ACP-compatible agent: Claude Code, Codex, OpenCode, Gemini, Cursor, Copilot, OpenClaw, and more.",
5
+ "keywords": [
6
+ "claude-code",
7
+ "skill",
8
+ "multi-agent",
9
+ "acpx",
10
+ "acp",
11
+ "agent-client-protocol",
12
+ "code-review",
13
+ "collaboration",
14
+ "council",
15
+ "debate",
16
+ "consensus",
17
+ "openclaw"
18
+ ],
19
+ "bin": {
20
+ "acpx-council": "./acpx-council.js"
21
+ },
22
+ "files": [
23
+ "acpx/",
24
+ "acpx-council.js"
25
+ ],
26
+ "scripts": {
27
+ "test": "bash -n acpx/bin/acpx-council && bash -n acpx/lib/*.sh && echo 'All scripts pass syntax check'",
28
+ "lint": "shellcheck acpx/bin/acpx-council acpx/lib/*.sh || true"
29
+ },
30
+ "dependencies": {},
31
+ "peerDependencies": {
32
+ "acpx": ">=0.1.0"
33
+ },
34
+ "peerDependenciesMeta": {
35
+ "acpx": {
36
+ "optional": true
37
+ }
38
+ },
39
+ "license": "MIT",
40
+ "repository": {
41
+ "type": "git",
42
+ "url": "git+https://github.com/csuwl/acpx-team.git"
43
+ },
44
+ "engines": {
45
+ "node": ">=18"
46
+ }
47
+ }